MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Computer Science
Social Engineering
Quiz 2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Q.1
How can you protect your PIN number at a cash machine from a criminal using "shoulder surfing"?
Cover your pin as you enter it
Use the cash machine in daylight
Get cash back from a shop
Q.2
True or false: Key-loggers remember keys used to find routes and gain information
True
False
Q.3
Stealing login information by watching someone else log in.
Phishing
Tailgating
Shoulder surfing
Quid pro quo
Q.4
Shouldering...
...means looking over somebodies shoulder to see personal information
...means framing as someone else to gain personal information
...means using pop-up adverts to redirect users
...means using threats to gain personal information
Q.5
You hack for fun, you cause no malicious damage. You may find a bug, but you won't report it. What type of "hat" hacker are you?
Black
Grey
White
Green
Q.6
This involves tempting someone with an offer which is hiding the true consequences.
Baiting
Quid Pro Quo
Tailgating
Shoulder Surfing
Q.7
An I.T. support technician might offer to remove a suspected virus, in return for remote access to your computer. They help initially, but the trick comes later. This is a form of....
Quid Pro Quo
Baiting
Pharming
Shoulder Surfing
Q.8
You hack to steal data and to cause disruption to the company. What type of "hat" hacker are you?
Black
Grey
White
Red
Q.9
The weakest point in a security system, is usually:
Poorly coded software
People
Unreliable hardware
Poor network connections
Q.10
What type of social engineering involves the criminal pretending to be a delivery person, and they need to be let into the building?
Piggybacking
Shoulder Surfing
Pretexting
Phishing
Q.11
What type of social engineering involves the attacker offering something, like a favour, in exchange for access to some personal information?
Quid Pro Quo
Pharming
Shoulder Surfing
Phishing
Q.12
True or False: Social Engineering and Malware are usually used for good intents
True
False
Q.13
Spyware...
...is another word for virus
...is the process of hiring people to find personal information
...involves physically looking at someone typing a password
...sends information away without permission
Q.14
True or false: Computer viruses are most commonly installed by a computer chip
True
False
Q.15
Blagging...
...means installing a virus into a computer
...is an often-used way to fix computers
...means persisting with a method of social engineering until it succeeds
...means framing as someone reliable or trusted to gain information such as passwords
Q.16
A Trojan...
...is inserted by hackers
...is a virus which misleads users
...is a common way to fight malware
Both A & B
Q.17
A worm...
...copies itself using a computer system
...often gains access through security failures on a certain computer
...is inserted into a system when nobody's looking
Both A & B
Q.18
Physical Threats...
...occur outside of a computer and are often used to gain personal information
...most commonly occur on social media
...are, most commonly, used to damage a computer
Q.19
Adware...
...is the process of creating an advert
...is the process of hacking into a site through an advert
...means giving possibly harmful adverts to a user
...is the term for any advert
Q.20
True or false: Pharming means misdirecting users to websites to install a virus or gain personal information
True
False
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)
Support mcqgeeks.com by disabling your adblocker.
×
Please disable the adBlock and continue.
Thank you.
Reload page